Vulnerability Details CVE-2026-34020
Use of GET Request Method With Sensitive Query Strings vulnerability in Apache OpenMeetings.
The REST login endpoint uses HTTP GET method with username and password passed as query parameters. Please check references regarding possible impact
This issue affects Apache OpenMeetings: from 3.1.3 before 9.0.0.
Users are recommended to upgrade to version 9.0.0, which fixes the issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 11.4%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2026-34020
-
cpe:2.3:a:apache:openmeetings:3.1.3
-
cpe:2.3:a:apache:openmeetings:3.1.4
-
cpe:2.3:a:apache:openmeetings:3.1.5
-
cpe:2.3:a:apache:openmeetings:3.2.0
-
cpe:2.3:a:apache:openmeetings:3.2.1
-
cpe:2.3:a:apache:openmeetings:3.3.0
-
cpe:2.3:a:apache:openmeetings:3.3.1
-
cpe:2.3:a:apache:openmeetings:3.3.2
-
cpe:2.3:a:apache:openmeetings:4.0.0
-
cpe:2.3:a:apache:openmeetings:4.0.1
-
cpe:2.3:a:apache:openmeetings:4.0.10
-
cpe:2.3:a:apache:openmeetings:4.0.11
-
cpe:2.3:a:apache:openmeetings:4.0.2
-
cpe:2.3:a:apache:openmeetings:4.0.3
-
cpe:2.3:a:apache:openmeetings:4.0.9
-
cpe:2.3:a:apache:openmeetings:5.0.0
-
cpe:2.3:a:apache:openmeetings:5.0.1
-
cpe:2.3:a:apache:openmeetings:6.0.0
-
cpe:2.3:a:apache:openmeetings:6.1.0
-
cpe:2.3:a:apache:openmeetings:6.2.0
-
cpe:2.3:a:apache:openmeetings:6.3.0
-
cpe:2.3:a:apache:openmeetings:7.0.0
-
cpe:2.3:a:apache:openmeetings:8.0.0